CN108924024A - A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method - Google Patents
A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method Download PDFInfo
- Publication number
- CN108924024A CN108924024A CN201810704569.4A CN201810704569A CN108924024A CN 108924024 A CN108924024 A CN 108924024A CN 201810704569 A CN201810704569 A CN 201810704569A CN 108924024 A CN108924024 A CN 108924024A
- Authority
- CN
- China
- Prior art keywords
- encrypting
- data
- decrypting
- terminal device
- interfaces
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0638—Clock or time synchronisation among nodes; Internode synchronisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/40006—Architecture of a communication node
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
Abstract
A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method, 1, judge terminal device identity ID code, 2, terminal device is synchronous with system clock, 3, each data byte first place and the exchange of two, end, 4, software is encrypted, 5, hardware is encrypted, 6, encrypted data safety transmitted.Decryption method includes the following steps, 1, judge terminal device identity ID code, 2, terminal device is synchronous with system clock, 3, hardware is decrypted, 4, each reception data byte except head and the tail two in addition to, the data swapping of all odd bits and the front, 5, software is decrypted, 6, decryption after data carry out normal data processing.For the physical layer, data link layer and network layer of industrial bus.
Description
Technical field
The present invention relates to technical field of network security, specially a kind of novel encrypting and decrypting communication system and its encrypting and decrypting
Method.
Background technique
Current industrial network system, bus is indispensable important link, and between the multiple equipment mounted in bus
The data swapped are often most important, such as national large project and military defense project control system, information security quilt
It is classified as the top priority of system design, for the key parameter of Protection control system, guarantees that equipment operates normally not by maliciously more
Change and attack, the data transmitted in bus must encrypt.But in currently practical application, much carried out by bus
Data transmission using single software cryptography mode even without cipher mode, be easy to crack and divulge a secret, and added using single software
It is close, more complicated algorithm can be leaned on to encrypt data, but excessively complicated calculation process, certainly will influence data processing when
Between, and then influence the real-time of whole system data transmission.
Summary of the invention
In order to overcome the deficiencies in the prior art, it is an object of the present invention to provide a kind of novel encrypting and decrypting communication systems
With its encrypting and decrypting method, the information which is sent to bus to terminal device respectively encrypts software and hardware, right
The encryption information that bus is sent to terminal device is respectively decrypted software and hardware.Transmit data in bus can
Reach optimal equilibrium state in property and real-time, the data transmission satisfactorily resolved in bus can not in safety and speed
The problem of taking into account.
In order to achieve the above-mentioned object of the invention, it solves the problems of in the prior art, the technical solution that the present invention takes
It is:A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method, including the 1st, 2 ... N encrypting and decrypting communication interfaces, the 1st,
2 ... N terminal devices, the 1st, 2 ... N terminal interfaces and crypto bus, the described 1st, 2 ... N encrypting and decrypting communication interfaces, including the
1,2 ... N channel switching circuits, the 1st, 2 ... N crypto bus interfaces and the 1st, 2 ... NFPGA, in addition to this, each encrypting and decrypting
Communication interface further includes the 1st, 2 ... n communication frequency circuits, wherein the 1st in the described 1st, 2 ... N encrypting and decrypting communication interfaces,
2 ... n communication frequency circuit input ends are connected with the 1st, 2 ... N channel switching circuits respectively, the described 1st, 2 ... N channels switching electricity
Road passes through the 1st, 2 ... N crypto bus interfaces respectively and is connected with crypto bus, switches for different frequency telecommunication circuit in channel
Switch under the control of circuit, realizes the data link between encrypting and decrypting communication interface and crypto bus, the described 1st, 2 ... N add
The 1st, 2 ... n communication frequency circuit output ends are connected with the 1st, 2 ... NFPGA respectively by I/O interface in close decryption communication interface,
Described 1st, 2 ... NFPGA are connected with the 1st, 2 ... N terminal interfaces respectively, the described 1st, 2 ... N terminal interfaces respectively with the 1st, 2 ...
N terminal device is connected.
The encryption method includes the following steps:
Step 1 judges terminal device identity ID code:System obtains terminal device identity ID code by inquiry first, if the ID
Code is illegal, the data of itself and the other members of system is forbidden to swap, and protects data safety;
Step 2, terminal device are synchronous with system clock:If terminal device identity ID code is legal, forces the terminal device and be
Clock of uniting is synchronous;
Step 3, each data byte first place and the exchange of two, end:To each data byte by the suitable of little-endian
Sequence is numbered by turn since O, the first and two, end exchange, according to black list, according to data item meaning:O indicates constant, 1 table
Show the data swapping with front;
Step 4 encrypts software:Data byte is sent in addition to head and the tail two to each, all odd bits and the front
Data swapping, complete software cryptography;
Step 5 encrypts hardware:Communication frequency is converted according to system command, if the millisecond data of real-time clock are surprise
Number, then be transformed to low frequency, if the millisecond data of real-time clock are even number, is transformed to high-frequency, completes hardware encryption;
Step 6, encrypted data safety are transmitted;
The decryption method includes the following steps:
Step 1 judges terminal device identity ID code:System obtains terminal device identity ID code by inquiry first, if the ID
Code is illegal, the data of itself and the other members of system is forbidden to swap, and protects data safety;
Step 2, terminal device is synchronous with system clock:If terminal device identity ID code is legal, forces the terminal device and be
Clock of uniting is synchronous;
Hardware is decrypted in step 3:Communication frequency is converted according to system command, if the millisecond data of real-time clock are surprise
Number, then be transformed to low frequency, if the millisecond data of real-time clock are even number, is transformed to high-frequency, completes hardware decryption,
If not knowing that the illegal terminal equipment of said frequencies parameter and changing rule will be unable to crack;
Step 4, each reception data byte are in addition to head and the tail two, the data swapping of all odd bits and the front:To each
It receives data byte to number by turn since O by the sequence of little-endian, according to black list contrary operation before this, press
According to data item meaning:O indicates constant, and 1 indicates the data swapping with front;
Software is decrypted in step 5:First place and the exchange of two, end that data byte is received to each, complete software solution
It is close;
Data after step 6, decryption carry out normal data processing.
Present invention has the advantages that:A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method, wherein described add
Decryption method includes the following steps that step 1 judges terminal device identity ID code, and step 2, terminal device are synchronous with system clock, step
Rapid 3, each data byte first place and the exchange of two, end, step 4 encrypt software, and step 5 adds hardware
Close, step 6, encrypted data safety are transmitted.The decryption method includes the following steps that step 1 judges terminal device
Identity ID code, step 2, terminal device is synchronous with system clock, and hardware is decrypted in step 3, step 4, each reception data
For byte in addition to head and the tail two, software is decrypted in the data swapping of all odd bits and the front, step 5, step 6, decryption
Data afterwards carry out normal data processing.Compared with the prior art, for the physical layer of industrial bus, data link layer and network
Layer, the present invention may be implemented to encrypt clear data in depth of both software, hardware, and this cipher mode is more extensive than current
The simple software cryptography used is relatively reliable, divulges a secret and substantially reduces a possibility that being cracked, in data communications security field
Have great importance.
Detailed description of the invention
Fig. 1 is a kind of encrypting and decrypting communication system block diagram of the present invention.
Fig. 2 is encryption method flow chart of steps of the present invention.
Fig. 3 is decryption method flow chart of steps of the present invention.
Specific embodiment
The present invention will be further explained below with reference to the attached drawings.
As shown in Figure 1, a kind of novel encrypting and decrypting communication system and its encrypting and decrypting method, including the 1st, 2 ... N encryption solution
Close communication interface, the 1st, 2 ... N terminal devices, the 1st, 2 ... N terminal interfaces and crypto bus, the described 1st, 2 ... N encrypting and decryptings
Communication interface, including the 1st, 2 ... N channel switching circuits, the 1st, 2 ... N crypto bus interfaces and the 1st, 2 ... NFPGA, except this
Outside, each encrypting and decrypting communication interface further includes the 1st, 2 ... n communication frequency circuits, wherein the described 1st, 2 ... N encrypting and decryptings
The 1st, 2 ... n communication frequency circuit input ends are connected with the 1st, 2 ... N channel switching circuits respectively in communication interface, the described 1st,
2 ... N channel switching circuits pass through the 1st, 2 ... N crypto bus interfaces respectively and are connected with crypto bus, communicate for different frequency
Circuit switches under the control of channel switching circuit, realizes the data-link between encrypting and decrypting communication interface and crypto bus
Road, in the described 1st, 2 ... N encrypting and decrypting communication interfaces the 1st, 2 ... n communication frequency circuit output ends by I/0 interface respectively with
1st, 2 ... NFPGA be connected, the described 1st, 2 ... NFPGA be connected respectively with the 1st, 2 ... N terminal interfaces, the described 1st, 2 ... N terminals
Interface is connected with the 1st, 2 ... N terminal devices respectively.
As shown in Fig. 2, the encryption method includes the following steps:
Step 1 judges terminal device identity ID code:System obtains terminal device identity ID code by inquiry first, if the ID
Code is illegal, the data of itself and the other members of system is forbidden to swap, and protects data safety.
Step 2, terminal device are synchronous with system clock:If terminal device identity ID code is legal, the terminal device is forced
It is synchronous with system clock.
Step 3, each data byte first place and the exchange of two, end:Little-endian is pressed to each data byte
Sequence numbered by turn since 0, it is the first with the exchange of two, end, according to shown in black list table 1, according to data item meaning:0
Indicate constant, 1 indicates the data swapping with front.
Table 1
Bit 0 1 2 3 4 5 6 7 Data 0 1 0 1 0 1 0 0
Step 4 encrypts software:Data byte is sent in addition to head and the tail two to each, all odd bits and the front
Data swapping, complete software cryptography.
Step 5 encrypts hardware:Communication frequency is converted according to system command, if the millisecond data of real-time clock
For odd number, then it is transformed to low frequency (baud rate selects 9600), if the millisecond data of real-time clock are even number, is transformed to
High-frequency (baud rate selects 19200), completes hardware encryption.
Step 6, encrypted data safety are transmitted.
As shown in figure 3, the decryption method includes the following steps:
Step 1 judges terminal device identity ID code:System obtains terminal device identity ID code by inquiry first, if the ID
Code is illegal, the data of itself and the other members of system is forbidden to swap, and protects data safety.
Step 2, terminal device is synchronous with system clock:If terminal device identity ID code is legal, the terminal device is forced
It is synchronous with system clock.
Hardware is decrypted in step 3:Communication frequency is converted according to system command, if the millisecond data of real-time clock
For odd number, then it is transformed to low frequency (baud rate selects 9600), if the millisecond data of real-time clock are even number, is transformed to
High-frequency (baud rate selects 19200), completes hardware decryption, if not knowing the illegal end of said frequencies parameter and changing rule
End equipment will be unable to crack.
Step 4, each reception data byte are in addition to head and the tail two, the data swapping of all odd bits and the front:To every
One reception data byte is numbered since 0 by turn by the sequence of little-endian, reverse according to black list table 1 before this
Operation, according to data item meaning:0 indicates constant, and 1 indicates the data swapping with front;
Software is decrypted in step 5:First place and the exchange of two, end that data byte is received to each, complete software solution
It is close;
Data after step 6, decryption carry out normal data processing.
The invention has the advantages that:A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method send out terminal device
The information to crypto bus is sent to pass through software and hardware progress complex encryption, the encryption message information difference of terminal device respectively
It is successively decrypted by software and hardware.Present invention employs the communication frequency handoff techniques of different parameters, and when switching
It carves unpredictable, increases the randomness of crypto bus information.Relative to the letter in current safety field based on software cryptography
Protected mode is ceased, for cracker, software cryptography uses simultaneously with hardware encryption, cracks difficulty and greatly improves, significantly
Increase the safety of communication process.
This software and combination of hardware encryption method can make to add by the real-time quick operation and processing of microcontroller
Data transmission in close bus reaches optimal equilibrium state in reliability and real-time, satisfactorily resolves the data in bus
The problem of can not take into account in safety and speed, hardware spending is small, and software operation is simple for transmission, is suitable for controller and instrument
The encryption communicated between instrument.
Claims (1)
1. a kind of novel encrypting and decrypting communication system and its encrypting and decrypting method, it is characterised in that:Including:1st, 2 ... N are encrypted
Decrypt communication interface, the 1st, 2 ... N terminal devices, the 1st, 2 ... N terminal interfaces and crypto bus, it is characterised in that:Described 1st,
2 ... N encrypting and decrypting communication interfaces, including the 1st, 2 ... N channel switching circuits, the 1st, 2 ... N crypto bus interfaces and the 1st, 2 ...
NFPGA, in addition to this, each encrypting and decrypting communication interface further include the 1st, 2 ... n communication frequency circuits, wherein the described 1st,
In 2 ... N encrypting and decrypting communication interfaces the 1st, 2 ... n communication frequency circuit input ends respectively with the 1st, 2 ... N channel switching circuit phases
Even, the described 1st, 2 ... N channel switching circuits pass through the 1st, 2 ... N crypto bus interfaces respectively and are connected with crypto bus, for not
Same frequency telecommunication circuit switches under the control of channel switching circuit, realizes between encrypting and decrypting communication interface and crypto bus
Data link, the 1st, 2 ... n communication frequency circuit output ends pass through I/O in the described 1st, 2 ... N encrypting and decrypting communication interfaces
Interface is connected with the 1st, 2 ... NFPGA respectively, the described 1st, 2 ... NFPGA be connected respectively with the 1st, 2 ... N terminal interfaces, described
1,2 ... N terminal interfaces are connected with the 1st, 2 ... N terminal devices respectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810704569.4A CN108924024A (en) | 2018-06-30 | 2018-06-30 | A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810704569.4A CN108924024A (en) | 2018-06-30 | 2018-06-30 | A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108924024A true CN108924024A (en) | 2018-11-30 |
Family
ID=64423540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810704569.4A Withdrawn CN108924024A (en) | 2018-06-30 | 2018-06-30 | A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108924024A (en) |
-
2018
- 2018-06-30 CN CN201810704569.4A patent/CN108924024A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1323507C (en) | Short block processing method in block encryption algorithm | |
CN105323249B (en) | A kind of encrypting and decrypting communication system and its encrypting and decrypting method | |
KR20040104724A (en) | Secure wireless local or metropolitan area network and related methods | |
WO2008153531A1 (en) | System and method of creating and sending broadcast and multicast data | |
KR102172181B1 (en) | Apparatus and Method for Patterned Cipher Block for Real-Time Data Communication | |
CN101707767B (en) | Data transmission method and devices | |
Rege et al. | Bluetooth communication using hybrid encryption algorithm based on AES and RSA | |
CN111224974A (en) | Method, system, electronic device and storage medium for network communication content encryption | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN113726725A (en) | Data encryption and decryption method and device, electronic equipment and storage medium | |
CN111884802B (en) | Media stream encryption transmission method, system, terminal and electronic equipment | |
CN114499857B (en) | Method for realizing data correctness and consistency in encryption and decryption of large data quanta | |
CN111988301A (en) | Secure communication method for preventing client from hacker violence attack | |
CN113300842B (en) | Method for improving security of symmetric encryption algorithm | |
CN108141353A (en) | The method and apparatus of cryptographic algorithm upgrading | |
CN107623682B (en) | Instruction transmission system based on double channels | |
CN113691370A (en) | Method and device for quantum secure communication | |
CN112765686A (en) | Power consumption attack prevention framework and method for algorithm key in chip | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
CN104579645B (en) | Key updating method based on AES encryption system | |
CN111800784A (en) | Block chain cloud service system based on cloud computing | |
CN101882991B (en) | Communication data stream encryption method based on block cipher | |
KR20060011999A (en) | Des algorithm-based encryption method | |
CN108924024A (en) | A kind of novel encrypting and decrypting communication system and its encrypting and decrypting method | |
CN102857341A (en) | Communication method for encrypted call |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181130 |
|
WW01 | Invention patent application withdrawn after publication |